summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/asn1 (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* More memory leaks and unchecked allocations; OpenSSL PR #3403 via OpenSSLmiod2014-07-114-7/+19
* Only import cryptlib.h in the four source files that actually need it.jsing2014-07-1165-209/+234
* Explicitly include <openssl/opensslconf.h> in every file that referencesjsing2014-07-1012-12/+46
* Use size_t as realloc() size argument whenever possible. ok tedu@miod2014-07-102-6/+8
* Inline the only use of the HEX_SIZE macro and nuke both DECIMAL_SIZE andjsing2014-07-101-2/+2
* Stop including standard headers via cryptlib.h - pull in the headers thatjsing2014-07-1024-32/+80
* make asn1 free safe to call with null pointers of any type.tedu2014-07-101-4/+3
* delete some casts. ok miodtedu2014-07-104-14/+14
* ASN1_STRING_free can handle NULL, so callers don't need to check. ok miodtedu2014-07-092-10/+7
* remove unused, private version strings except SSL_version_strbcook2014-07-091-2/+1
* Remove M_ASN1_New* macros which are only used in X509_PKEY_new() are obfuscatemiod2014-06-272-22/+16
* Unifdef -UNO_SYS_TYPES_Hmiod2014-06-243-12/+6
* Remove previously commented out wrong code, as well as the comment saying thismiod2014-06-241-3/+1
* nuke unused test programs; ok jsingderaadt2014-06-222-46/+2
* tags as requested by miod and teduderaadt2014-06-1282-80/+82
* do not include dso.h where it is not needed; ok miodderaadt2014-06-091-1/+0
* malloc() result does not need a cast.deraadt2014-06-071-1/+1
* There is no need for is{upper,lower}() tests before to{lower,uppper}(),deraadt2014-06-011-23/+6
* Change the actual default for returned asn1 strings to be utf8 in the code,beck2014-05-311-1/+1
* Add a comment documenting where libssl depends upon the current (objectionable)miod2014-05-311-0/+1
* more: no need for null check before freederaadt2014-05-3012-46/+23
* remove CONST_STRICT. ok beck deraadttedu2014-05-301-2/+0
* no need for null check before free. from Brendan MacDonelltedu2014-05-309-28/+14
* convert 53 malloc(a*b) to reallocarray(NULL, a, b). that is 53deraadt2014-05-292-2/+2
* Everything sane has stdio, and FILE *. we don't need ifdefs for this.beck2014-05-297-20/+0
* remove unused shit. from Alexander Schrijvertedu2014-05-252-4/+2
* We have shared global variables - unifdef OPENSSL_EXPORT_VAR_AS_FUNCTION.jsing2014-05-242-69/+0
* Almost nothing actually needs to include <openssl/e_os2.h>, however byjsing2014-05-242-2/+6
* Expand OPENSSL_{GLOBAL,EXTERN} macros that I missed last time around,jsing2014-05-242-2/+2
* if (x) free(x) -> free(x); semantic patch generated with coccinelle, carefullymiod2014-05-222-6/+3
* KNF.jsing2014-05-223-171/+154
* No uses of UTF8_{getc,putc}() in ports, so remove them from the public header.guenther2014-05-222-9/+8
* Bring UTF8_{getc,putc} up-to-date: it's been a decade since 5- and 6-byteguenther2014-05-204-93/+88
* If you need to allocate `a + b' bytes of memory, then don't allocate `a + b*2',miod2014-05-183-6/+6
* Make sure UTF8_getc() is invoked with the proper buffer size.miod2014-05-181-2/+2
* Fix memory leaks upon failure.miod2014-05-152-27/+39
* Replace ASN1_GENERALIZEDTIME_adj(), ASN1_UTCTIME_adj() andmiod2014-05-153-25/+73
* Bring back ASN1_seq_pack(), ASN1_seq_unpack(), ASN1_pack_string() andmiod2014-05-122-0/+108
* i give up. reuse problem is unfixable. dlg says puppet crashes.tedu2014-05-041-8/+4
* Use C99 initializers for the various FOO_METHOD structs. More readable, andmiod2014-04-272-15/+12
* static const char * = "" -> static const char[] = "", to produce shorter code.miod2014-04-273-3/+3
* Unifdef -U OPENSSL_BUILD_SHLIBCRYPTO, since all it causes under Unix is tomiod2014-04-272-10/+0
* Replace all use of ERR_add_error_data with ERR_asprintf_error_data.beck2014-04-265-21/+12
* Unifdef -UPEDANTIC. ok beck@ tedu@miod2014-04-231-6/+0
* Remove duplicate pointer assignment in ASN1_primitive_free(); Dirk Englingmiod2014-04-231-1/+0
* Casting from a const unsigned char ** to a const unsigned char ** seems...jsing2014-04-231-8/+4
* Make sure ret->name is NULL'ed before return when freeing.beck2014-04-231-0/+1
* Rather than sprinkling magical numbers everywhere, we can use sizeof()beck2014-04-231-4/+4
* null a pointer to prevent double free. from Dirk Englingtedu2014-04-221-0/+1
* fix memory leaks. from Dirk Englingtedu2014-04-223-21/+12